Illinois Administrative Code
Title 14 - COMMERCE
Part 100 - ELECTRONIC COMMERCE SECURITY ACT
Section 100.40 - Recognition of Qualified Security Procedures
Current through Register Vol. 48, No. 38, September 20, 2024
a) The security structure of technology known as public key cryptographyis certified by a CA as a qualified security procedure for use by private entities in Illinois, provided that the digital signature is created consistent with this Section. Cryptography is a commercially reasonable standard and procedure for use by private industries in Illinois, provided that the digital signature is created consistent with this Section.
b) The Electronic Commerce Security Act requires that a digital signature be unique to the signer within the context in which it is used. A public key-based digital signature may be considered unique to the signer using it if:
c) The Act requires that a digital signature can be used to objectively identify the person signing the electronic record. A public-key based digital signature is capable of objectively identifying the person signing the electronic record if:
d) The Act requires that the digital signature be reliably created by an identified person and cannot be readily duplicated or compromised. The signer and all other persons that rightfully have access to signature devices assume a duty to exercise reasonable care to retain control and maintain secrecy of the signature device and to protect it from any unauthorized access, disclosure, or use during the period when reliance on a signature created by such device is reasonable.
e) The Act requires that the digital signature be created, and be linked to the electronic record to which it relates, in a manner that, if the record or the signature is intentionally or unintentionally changed after signing, the electronic signature is invalidated.